FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

non port: head/devel/py-repoze.who-testutil/distinfo
SVNWeb

Number of commits found: 3

Mon, 16 Jan 2012
[ 13:07 wen ] Original commit 
1.2 devel/py-repoze.who-testutil/Makefile
1.3 devel/py-repoze.who-testutil/distinfo
- update to 1.0.1
- reset maintainership to ports@
Sun, 3 Jul 2011
[ 14:59 ohauer ] Original commit 
1.3 devel/9base/distinfo
1.5 devel/ElectricFence/distinfo
1.29 devel/ORBit/distinfo
1.74 devel/ORBit2/distinfo
1.4 devel/SpecTcl/distinfo
1.21 devel/ZendOptimizer/distinfo
1.22 devel/aap/distinfo
1.6 devel/ace+tao-doc/distinfo
1.4 devel/ace/distinfo
1.22 devel/acpicatools/distinfo

(Only the first 10 of 1775 ports in this commit are shown above. View all ports for this commit)
-remove MD5
Fri, 7 Aug 2009
[ 20:08 miwi ] Original commit 
1.3588 devel/Makefile
1.1 devel/py-repoze.who-testutil/Makefile
1.1 devel/py-repoze.who-testutil/distinfo
1.1 devel/py-repoze.who-testutil/pkg-descr
1.1 devel/py-repoze.who-testutil/pkg-plist
repoze.who-testutil is a repoze.who plugin which modifies
repoze.who's original middleware to make it easier to forge
authentication, without bypassing identification (this is,
running the metadata providers).

It's been created to ease testing of repoze.who-powered
applications, in a way independent of the identifiers,
authenticators and challengers used originally by your
application, so that you won't have to update your test
suite as your application grows and the authentication
method changes.

WWW:    http://code.gustavonarea.net/repoze.who-testutil/

PR:             ports/137458
Submitted by:   Wen Heping <wenheping at gmail.com>

Number of commits found: 3

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
dnscrypt-proxy*Feb 14
horde-baseFeb 14
openssh-portable*Feb 14
pear-Horde_CoreFeb 14
nghttp2Feb 13
qemu*Feb 13
qemu*Feb 13
qemu*Feb 13
qemu*Feb 13
qemu*Feb 13
qemu-devel*Feb 13
qemu-devel*Feb 13
qemu-devel*Feb 13
qemu-devel*Feb 13
qemu-devel*Feb 13

34 vulnerabilities affecting 87 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 25659
Broken 361
Deprecated 92
Ignore 635
Forbidden 0
Restricted 206
No CDROM 87
Vulnerable 58
Expired 2
Set to expire 74
Interactive 0
new 24 hours 4
new 48 hours10
new 7 days27
new fortnight53
new month131

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.